Marc Ph. Stoecklin
According to our database1,
Marc Ph. Stoecklin
authored at least 35 papers
between 2006 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IWSPA@CODASPY 2021: ACM Workshop on Security and Privacy Analytics, 2021
2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Passive security intelligence to analyze the security risks of mobile/BYOD activities.
IBM J. Res. Dev., 2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016
Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility.
IBM J. Res. Dev., 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
2012
2011
2010
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic.
Proc. VLDB Endow., 2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
2009
Proceedings of the Passive and Active Network Measurement, 10th International Conference, 2009
2008
Proceedings of the Passive and Active Network Measurement, 9th International Conference, 2008
2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006